Nobody downloaded yet

Acceptable Use Policy - Assignment Example

Comments (0) Cite this document
Summary
This essay presents AUP which has been developed to promote the attainment of company objectives at InfoSec focuses upon establishing a set of rules to compliment the organization’s cultural values while maintaining the essence of integrity, honesty and conviction which is upheld at the firm…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Acceptable Use Policy
Read TextPreview

Extract of sample "Acceptable Use Policy"

Download file to see previous pages From this paper it is clear that the tenets of the implemented Acceptable Use Policy (AUP) at the InfoSec are based upon safeguarding the stakeholders of the firm so as to not comprise their identity and information due to any breach of code or confidence. The primary clauses of AUP which should be reported in this regard refer to 1) general use and possession 2) access and availability of security data and propriety information 3) guidelines for classifying improper use of facilities 4) regulations governing blogging and 5) policies which must be adhered to ensure that the AUP is effectively enforced across the firm.As the discussion highlights the standard notifications to highlight unacceptable use of services by engaging in activities which are disallowed unless the employee is undertaking an activity which is directly related to his/her job-related tasks is a comprehensive consideration of InfoSec’s Acceptable Use Policy (AUP). In this case, the firm focuses upon recognizing a comprehensive list of instances and scenarios under which the employee shall be held liable for a breach of the Acceptable Use Policy (AUP) due to his/her participation in the listed activities. Moreover, such circumstances can be broadly categorized as 1) System and Network Activities and 2) Email and Communication Activities. The popularity of social networking mediums has enhanced the need to implement effective and comprehensive AUPs to assist the usage of network facilities. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Acceptable Use Policy Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1652620-acceptable-use-policy
(Acceptable Use Policy Assignment Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1652620-acceptable-use-policy.
“Acceptable Use Policy Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1652620-acceptable-use-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Acceptable Use Policy

Is Torture ever acceptable

...and age, there have been a number of revelations beginning and ending upon the question of whether or not torture is morally justifiable and acceptable in society, and this paper helps to provide an insight regarding the very issue. Human beings have a right to carry out actions according to their preferences and choices and have an option of doing whatever they feel like as long as it does not interfere with the wishes of another person to a great extent. However, when a man forces someone else to do something by inflicting pain upon that person, it is not justifiable at all. This is because each man has his freedom to do whatever he may feel like and no man has the right to traumatize another by use of...
2 Pages(500 words)Essay

Is torture ever Acceptable

...? Is torture ever Acceptable? An Argumentative Paper The idea of torturing someone takes one to guess the account of investigative authorities. Torture is mostly done for the purpose of getting useful information which might be involved with a crime. Avid investigation through the aid of torture can lead to help saving lives and property. But at the same time, torturing someone who is not aware of the desired information will be an illegal attempt as it will violate rights of the individual. The debate regarding torture being acceptable has become crucial over the years. This paper deals with the argument of torture being done to get useful information. Proponents of...
3 Pages(750 words)Essay

Acceptable Use and Behavior Policy

...? Acceptable use and behavior policy Acceptable use and behavior policy Firion Corporation is a company that produces, develops and markets specially designed jackets used in safety related applications such as waste disposal. Over the years, the company has increasingly adopted the use of technology in the storage and maintenance of customer and employee data as well as important and sensitive information regarding industrial designs of its products (Goodrich and Tamassia, 2011). To protect confidential information and its financial interests, the company has adopted a number of...
3 Pages(750 words)Essay

Corporate Acceptable Use Policy

The paper intends to discuss the purpose of the Acceptable Use Policy (AUP) developed by AT&T for its employees. The Purpose of an Acceptable Use Policy An Acceptable Use Policy is a collection of particular rules and policies which are implemented by the network and websites managers in order to enact certain restrictions regarding the utilization of available websites and networks. Most of the times, AT&T is found to be committed to obeying the government rules and regulations regarding the utilization of online sources, e-mail transmission and text messaging. The company always focuses on protecting the AT&T’s network and its online sources without getting interferences from the hands of the other users. In or...
5 Pages(1250 words)Case Study

Reminders About the Acceptable Use of Email and Text Messaging

...Reminders about the acceptable use of email and text messaging Abstract The paper is a procedural email to employees reminding the key components of a company policy on acceptable use of email and text messaging. The paper consists of the subject line. The first paragraph talks about the main idea which talks about the acceptable use of email and text messaging policy of the People Support Aegis Company. The next paragraphs discuss the policy of the company giving some examples. It tells the reason the policy were made. The paper also tells some security, monitoring and privacy issues. It also talks about the sanctions given for an employee who cannot comply with the policy. The paper is ended with a closing thought. Reminding... the...
2 Pages(500 words)Essay

Company Policy on Acceptable Use of Email and Text Messaging

... Company Policy on Acceptable Use of Email and Text Messaging Receive our warm greetings. This is a reminder about components of the company’s policy on acceptable use of email and text messaging. It emphasizes the components of security, privacy and company monitoring of messages. The memo shall also consider other policies that connect with the aforementioned policy. These policies regard appropriate message content, consequences for using company equipment to send harassing messages and use of company system for sending personal email messages. You are reminded that the policy discourages employees from intentionally causing any security breach to the company’s and any other networks. Always recall that the policy’s provision... that...
1 Pages(250 words)Assignment

Information Systems Use Security Policy

...Computer Science & Information Technology Information Systems Use Security Policy In an organization, information management systems are in most cases used in decision-making and co-ordination of tasks in the organization and the industry (Sousa & Effey, 2014). For a business that is experiencing growth, information systems allow the company to become highly competitive and adapt to market changes. For example, service delivery advancements, creation of new business models and using just-in-time inventory would not be possible if it were not for the use of information systems. However, using the information systems in a growing company...
3 Pages(750 words)Assignment

Acceptable Use Policy & Security Audit

...Acceptable use policy and general objective For a fair, acceptable and responsible use of IT, there should be a lot of secrecy and individual privileges. All the daily users of computer and network, are expected to adhere and obey the use secrecy and others rights. This should not be violated in any circumstances. The files, data and programs of others should be used without their consent. People using the various networks and computer systems should not intimidate, insult, deform and threaten other users is not permitted. This might lead to disciplinary action through legal suits. Users have the right...
2 Pages(500 words)Essay

Acceptable Use Policy & Security Audit

...Acceptable Use Policy & Security Audit Acceptable Use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used. AUP form an integral part of information security policies (Harriett 37). New members are supposed to sign this policy before giving them access to information systems. AUP are supposed to be clear and cover so many points in regard to users, what and not they are allowed to do in regard to the IT systems. In case it is not detailed, it should always refer to a comprehensive policy....
2 Pages(500 words)Essay

Acceptable Use Policy & Security Audit

...no. Acceptable Use Policy & Security Audit Part I: Acceptable Use Policy (AUP) The Acceptable Use Policy (AUP) policy usually applied to those persons intending to use IT resources owned by an entity. Computer resources herein applies to hardware and software, smart phones, PDAs, data network, and stored data among others. Notably, only the owner of internet resource data (so known by the federal law) can change the policies governing the accessibility of IT resources governed by the policy. For instance, in the case...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Acceptable Use Policy for FREE!

Contact Us